Skip to content

Commit 1550035

Browse files
committed
Moved items that were in the wrong section
1 parent f1d2702 commit 1550035

File tree

1 file changed

+14
-12
lines changed

1 file changed

+14
-12
lines changed

articles/azure-monitor/alerts/alerts-troubleshoot-log.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -47,18 +47,6 @@ A common issue is that you think that the alert didn't fire, but the rule was co
4747

4848
:::image type="content" source="media/alerts-troubleshoot-log/LogAlertSuppress.png" lightbox="media/alerts-troubleshoot-log/LogAlertSuppress.png" alt-text="Suppress alerts":::
4949

50-
## A log search alert fired when it shouldn't have
51-
52-
A configured [log alert rule in Azure Monitor](./alerts-log.md) might be triggered unexpectedly. The following sections describe some common reasons.
53-
54-
1. **Was the alert triggered due to latency issues?**
55-
56-
Azure Monitor processes terabytes of customer logs globally, which can cause [logs ingestion latency](../logs/data-ingestion-time.md). There are built-in capabilities to prevent false alerts, but they can still occur on very latent data (over ~30 minutes) and data with latency spikes.
57-
58-
Logs are semi-structured data and are inherently more latent than metrics. If you're experiencing many misfires in fired alerts, consider using [metric alerts](alerts-types.md#metric-alerts). You can send data to the metric store from logs using [metric alerts for logs](alerts-metric-logs.md).
59-
60-
Log search alerts work best when you are try to detect specific data in the logs. They are less effective when you are trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
61-
6250
1. **Was the the log search alert rule disabled?**
6351

6452
If a log search alert rule query fails to evaluate continuously for a week, Azure Monitor disables it automatically.
@@ -149,6 +137,20 @@ When a log alert rule is created, the query is validated for correct syntax. But
149137

150138
[Azure Advisor](../../advisor/advisor-overview.md) warns you about this behavior. It adds a recommendation about the affected log search alert rule. The category used is 'High Availability' with medium impact and a description of 'Repair your log alert rule to ensure monitoring'.
151139

140+
141+
## A log search alert fired when it shouldn't have
142+
143+
A configured [log alert rule in Azure Monitor](./alerts-log.md) might be triggered unexpectedly. The following sections describe some common reasons.
144+
145+
1. **Was the alert triggered due to latency issues?**
146+
147+
Azure Monitor processes terabytes of customer logs globally, which can cause [logs ingestion latency](../logs/data-ingestion-time.md). There are built-in capabilities to prevent false alerts, but they can still occur on very latent data (over ~30 minutes) and data with latency spikes.
148+
149+
Logs are semi-structured data and are inherently more latent than metrics. If you're experiencing many misfires in fired alerts, consider using [metric alerts](alerts-types.md#metric-alerts). You can send data to the metric store from logs using [metric alerts for logs](alerts-metric-logs.md).
150+
151+
Log search alerts work best when you are try to detect specific data in the logs. They are less effective when you are trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
152+
153+
152154
## Error messages when configuring log search alert rules
153155

154156
### The query couldn't be validated since you need permission for the logs

0 commit comments

Comments
 (0)